G06Q20/38215

SYSTEMS, DEVICES AND METHODS FOR TRACKING AUTHENTICATED CLEAN ENERGY WITH BLOCKCHAINS
20230134095 · 2023-05-04 ·

Systems, devices and methods for managing a preferred energy supply chain are provided. A system including a specialized hardware- and software-based control system with access to a network including one or more distributed ledger(s) authorizes one or more energy distribution entity(ies) to reserve future right(s) to preferred energy for distribution to customers using new forms of promissory tokens (e.g., reserved preferred energy tokens). The system includes a secure metering device with a crypto-processor, holding an asymmetric cryptography key pair associated with preferred energy production hardware. The device is physically attached or integrated with the production hardware, and exclusively holds a unique private key of the asymmetric cryptography key pair, while publishing only the public key of the key pair through the network. The system authenticates production of, and transactions in, clean energy using new forms of smart contracts between buyers and sellers, with the aid of a governance body.

System, Method, and Computer Program Product for Sensitive Data Obfuscation
20230133702 · 2023-05-04 ·

Provided is a computer-implemented method, system, and computer program product for obfuscating a captured credential's sensitive data. The method includes detecting, localizing, bounding, and outputting an image of the credential with the sensitive data obfuscated so that it is not human or machine readable during capture or output.

PROVISIONING OF ACCESS CREDENTIALS USING DEVICE CODES

Systems and methods are described for provisioning access credentials to a mobile device using device and authorization codes. Once provisioned, a mobile device can be used to conduct a transaction.

SYSTEM AND METHOD FOR PAYMENT PLATFORM SELF-CERTIFICATION FOR PROCESSING FINANCIAL TRANSACTIONS WITH PAYMENT NETWORKS
20230206191 · 2023-06-29 ·

Payment platforms such as point of sale terminals can send test transactions to an acquirer processor certification and analytics system for certification of the payment platform's readiness to perform financial transaction processing with payment networks. A payment platform sends a test transaction to an acquirer processor and receives a unique request identifier. The request identifier and a test identifier associated with the test transaction are sent to an analytics engine that retrieves data associated with the test transaction from the acquirer processor, and expected values based on the test identifier. The analytics engine performs a comparison and determines a certification result for the payment platform based on the comparison. Based on certification results, authorization or licenses can be granted to payment platforms to use payment networks of the acquirer processor.

SECURE ELECTRONIC TOKENS IN AN ELECTRONIC TOKENING SYSTEM

An electronic tokening system implemented by a data source transmits secure electronic tokens including time-based values to a plurality of terminals. The terminals may be geographically disparate, and the different terminals may have different connection speeds to the data source. The terminals may use the secure electronic tokens to consistently and reliable calculate data values.

Method of Authenticating and Exchanging Virtual Currency
20170372277 · 2017-12-28 ·

A method of authenticating and exchanging virtual currency is used to permit secure ownership of virtual currency and manage financial transactions. The method is performed by a system that includes a user computing device and plurality of remote servers. The user computing device stores an unverified certificate which is used as currency. The plurality of remote servers is used to authenticate the unverified certificate and aid in transferring ownership of the unverified certificate. To do so, each remote server executes an authentication process for the unverified certificate and sends either a pass status or a fail status to the user computing device. The user computing device executes an assessment process for the unverified certificate based on the pass statuses and fail statuses received. Authentication information related to the unverified certificate is then updated on the user computing device and each remote server that returned the pass status.

PAYMENT BY MOBILE DEVICE SECURED BY F-PUF

A method, executed by a processor of a mobile communication device, for authenticating a purchase transaction includes receiving a certificate from a purchase agent and authenticating the purchase transaction based upon a comparison outcome of the certificate and a Flash Physical Unclonable Function (F-PUF) of a nonvolatile memory device integrated within the mobile communication device.

METHOD AND SYSTEM OF PROVIDING PROOF OF PROVENANCE OF DIGITAL RECEIPT
20230206192 · 2023-06-29 · ·

A method for generating a digital receipt for a transaction including provenance information for purchased products includes: receiving a data request from a first computing device including a transaction identifier related to a processed payment transaction; identifying transaction details for the processed payment transaction based on the transaction identifier, the transaction details including a product identifier for each of one or more products purchased in the processed payment transaction; transmitting the product identifier for each of the one or more products to a second computing device; receiving provenance data for each of the one or more products from the second computing device; generating a digital receipt for the processed payment transaction, the digital receipt including the received provenance data for each of the one or more products; and transmitting the generated digital receipt to the first computing device.

SYSTEMS AND METHODS FOR REMOTE PAY TRANSACTIONS

A system receives a remote pay authorization request message from a first consumer. The message includes a transaction token with transaction details. The system also receives first user mapping data from a first issuer. The mapping data includes a unique ID corresponding to a second consumer (i.e., a paying consumer). The system receives a second remote pay authorization request message from the second consumer. The message includes a payment token that includes consumer payment account data. The system also receives second user mapping data from a second issuer. The second user mapping data includes the unique ID. The system determines that the unique ID is included in the first and second user mapping data. The system merges the transaction token and the payment token into a combined payment token, thereby enabling the second consumer to pay for a transaction performed by the first consumer.

Consumer device based point-of-sale

Systems and related methods facilitating interactions between a merchant device, a central system and a consumer device are discussed herein. Wallet identifying data may be used to secure messages between the consumer device and the merchant device over a wireless link. For example, the merchant device may include circuitry configured to wirelessly receive the wallet identifying data from a consumer device and to transmit the wallet identifying data to the central system. In response, consumer identifying data associated with the wallet identifying data may be received by the merchant device from the central system. In some embodiments, the consumer identifying data may be associated with a unit of location, such as a dine-in location at a restaurant, to facilitate consumer service.