G06Q20/38215

SMART INCLUSION OF TECHNOLOGY AT TIME OF USE

Apparatuses, methods, systems, and program products are disclosed for modifying the enabled features of a hardware component at the time of use. An apparatus includes a processor and memory that stores code executable by the processor. The code is executable by the processor to obtain a feature of the hardware component that is not enabled and generates an encrypted code associated with the feature of the hardware component to be enabled. The apparatus processes a payment for the cost of enabling the hardware component and enables the feature of the hardware component in response to the association of the payment processed with the encrypted code for the feature of the hardware component.

SYSTEMS AND METHODS FOR REAL-TIME CONTRACT SETTLEMENT

In one embodiment, a real-time claim processing system is provided that quickly settles received claims. At each stage of the claim processing, the real-time processing system may write some or all of the claim to a distributed ledger, which may be later retrieved and used as evidence of the claim processing. In addition, the claim may be verified by a smart contract associated with the claim that may also control the pricing and settlement of the received claim. The use of a smart contract may allow the claim to be verified and settled in real, or near-real time, which is an improvement over current methods for processing claims which are slow and costly. Smart contracts also provide consistency and transparency to claims processing.

SYSTEM AND METHOD FOR BLOCKCHAIN TOKENS FOR GAMING

A system and method for in-game tokens or specialized virtual currency which may be used for a variety of transactions, including within a plurality of games, yet for which transactions may be sufficiently controlled to avoid adverse real world effects. The system and method provide blockchain tokens for gaming, in which transactions related to such blockchain transactions are both controlled and flexible.

Platform for coordinated credit-based and non-custodial digital asset settlement
11651353 · 2023-05-16 · ·

A plurality of computer-based transactions facilitated by each of a plurality of custodians are monitored. A first transaction of the plurality of transactions includes a transfer of an amount of cryptocurrency of a first type by a first counterparty to a second counterparty in exchange for an amount of cryptocurrency of a second, different type. Transaction packages are generated by each counterparty which include requisite information to effect the transfer. A settlement coordinator asynchronously receives (via a computing network) the transaction packages which specify information required to (i) transfer the cryptocurrency of the first type from the first counterparty to the second counterparty on a first blockchain and (ii) transfer the cryptocurrency of the second type from the second counterparty to the first counterparty on a second blockchain. The settlement coordinator after receiving the first request and the second request accesses the first blockchain and the second blockchain to transfer ownership of the cryptocurrency of the first type and the cryptocurrency of the second type to effect the first transaction.

Data Storage and Management and Methods of Thereof
20230153804 · 2023-05-18 ·

Described herein are various methods of sharing data across multiple computers. The method of sharing data permits the pruning of data from the shared data.

Distributed electronic ledger with metadata

A system has a storage medium encoded with program instructions, and a processor coupled to access the program instructions. The instructions configure the processor for: receiving a first request at a POS terminal to surrender a previously purchased first asset in exchange for at least a portion of a second asset that was used to purchase the first asset, receiving the private key from the first asset; accessing a set of rules stored in a distributed electronic ledger, the set of rules specifying conditions associated with the first request; transmitting an authorization to return the at least a portion of the second asset in exchange for surrender of the first asset, in the case where the conditions are satisfied; and invalidating the first request in the case where one or more of the conditions are not satisfied.

Method of managing an emergency mode transaction procedure, and an associated device
11640597 · 2023-05-02 · ·

A method and device for managing an emergency procedure of an emergency transaction mode that can be activated in the event of a computer attack on or a failure of a transaction network. The method may be carried out by an electronic device suitable for performing a transaction in a normal mode or in the emergency mode. The method performs operations that may include receiving an activation command for activating the emergency mode procedure, where the command includes an identifier of the procedure and first encrypted data; verifying the activation command, which includes verifying the first encrypted data; and if verification of the command is successful, activating the emergency procedure.

METHOD AND SYSTEM OF ASSOCIATING CUSTOM CARD DESIGNS WITH NON-FUNGIBLE TOKENS

A method for performing dual verification to combine a non-fungible token (NFT) with a digital payment instrument includes: receiving a first set of authentication credentials and a second set of authentication credentials, the first including a transaction account identifier, and the second set including an NFT identifier and a public key of a cryptographic key pair; performing a first verification process using the first set of authentication credentials based on at least a comparison of the first set of authentication credentials with data associated with a transaction account identified using the transaction account identifier; performing a second verification process using at least the second set of authentication credentials based on validation of a digital signature using the public key, the digital signature being identified using the NFT identifier; and transmitting a result of the first verification process and the second verification process to a computing device.

Secure Pairing for Payment Devices
20230146558 · 2023-05-11 · ·

At least one of a user-buyer device or a point of sale (POS) device having a UI (user interface) is configured with hardware, software, or algorithmic protocols, configurations, and safeguards that combat attempted unauthorized activity and theft by malicious attackers. Such configurations are in place to safeguard transactions between an authenticated buyer-user device and a POS device. Using digital certificates at one or both of the POS device or buyer device enables the other party to verify the other party and ensure that some malicious device has not intercepted communications or performed some man-in-the-middle attack.

Resource transfer method and apparatus, storage medium, and computer device

An apparatus including processing circuitry and a method are described. When receiving a cross-chain transaction request to transfer a resource from a first account to a second account, the processing circuitry is configured to generate a task corresponding to the first account. The task can indicate conditions for implementing events in transferring the resource. A first blockchain system provides services for the first account, and a second blockchain system different from the first blockchain system provides services for the second account. The processing circuitry transfers the resource to the second account based on the task when a first plurality of first nodes in the first blockchain system reaches a consensus on a generation event of the task and updates a task status of the task to being finished when a plurality of second nodes in the second blockchain system reaches a consensus on a transfer event of the resource.