G06Q20/38215

Transaction signing utilizing asymmetric cryptography

Embodiments relate to systems, apparatuses, and methods for performing transaction signing utilizing asymmetric cryptography and a private ledger. A transaction data is signed by a user device using a private key, and may be utilized in an authorization request message without including a real credential of the user. A transaction verification and accounting module (TVAM) can verify the signed transaction data and can continue processing the transaction.

Connected device transaction code system

Described herein are systems and methods in which more secure methods are provided for a connected device to conduct transactions. In accordance with embodiments of the disclosure, a transaction code is generated and provided to the connected device. The transaction code may be stored in association with the information for the transaction such that when the transaction code is received at a transaction processing server, the transaction processing server is configured to generate an authorization request that includes the transaction information. The authorization request may then be routed to an authorization server associated with an account maintained by the transaction processing server.

Method and apparatus for processing account of blockchain network, and storage medium

Disclosed are a method and apparatus for processing an account of a blockchain network. The method includes: obtaining an account transaction request associated with a chain account, wherein, the chain account belongs to the blockchain; obtaining an account smart contract from the account transaction request, and writing the account smart contract into a block, wherein, the account smart contract is configured to perform operation on a chain element in the chain account when executed.

Method and device for control of blockchain data access based on smart contract

The present disclosure provides a method and a device for control of blockchain data access based on a smart contract. The method includes obtaining, by a blockchain node, an access operation request of an institution, the access operation request including a transaction identifier of a transaction to be accessed, according to the transaction identifier, determining a blockchain state corresponding to the transaction identifier, the blockchain state including a hash value of the transaction corresponding to a last time change of the blockchain state, according to the hash value of the transaction corresponding to the last time change in the blockchain state and an identifier of the institution, performing data access control on the institution, obtaining control result, and transmitting the control result to the institution.

SERVICE VOUCHER PROCESSING METHOD, DEVICE, AND SYSTEM, AND STORAGE MEDIUM

A service voucher processing method, device, and system, and a storage medium are disclosed. The method includes: obtaining information about a candidate service, and loading a virtual identifier of the candidate service in a graphical interface; initiating, if a target service reserved by the reservation instruction is detected, a reservation request; obtaining a service voucher corresponding to the target service based on permission corresponding to the target service, and activating the service voucher when an instruction for using the target service is detected; performing authentication on the permission, a verification request carrying permission information, and a serial communication method being used for the verification request; and providing the permission when the authentication passes, determining that the target service is used, and cancelling the permission. The present disclosure can support, in a high-efficient and convenient manner, a user to use services such as taking a bus/metro/train or the like.

Systems and methods for authentication of access tokens

Systems and methods for authentication may include a first device including a memory, a communication interface, and one or more processors. The memory may include a counter value, transmission data, and at least one key. The one or more processors may be in communication with the memory and communication interface. The one or more processors may be configured to create a cryptogram using the at least one key and counter value, wherein the cryptogram includes the counter value and the transmission data; transmit the cryptogram via the communication interface; update the counter value after cryptogram transmission; receive an encrypted access token via the communication interface; decrypt the encrypted access token; store the decrypted access token in the memory; and transmit, after entry of the communication interface into a communication field, the access token via the communication interface for access to one or more resources, wherein the access token is encrypted.

COMPUTER-IMPLEMENTED ELECTRONIC COUPON SYSTEM AND METHODS USING A BLOCKCHAIN
20170364936 · 2017-12-21 · ·

A computer implemented electronic computer system using a blockchain method for creating, distributing, validating, and redeeming a secure electronic smartcoupon. A smartcoupon transaction record is highly secure and may comprise embedded business rules that define the requirements that consumers and retailers must meet for the smartcoupon to redeemed. Consumers may save or hold smartcoupons in a variety of different digital wallets. Retailers may redeem through their POS system by evaluating the embedded business rules in the smartcoupon against the consumer's purchase basket and if valid, completing the redemption process by publishing a redemption token to smartcoupon transaction record on the Blockchain database.

SECURED AUTHENTICATION AND TRANSACTION AUTHORIZATION FOR MOBILE AND INTERNET-OF-THINGS DEVICES
20170364875 · 2017-12-21 ·

Highly secured transactions for mobile or Internet-of-Things (IoT) devices can be conducted using a one-time seed technology (OTST). For example, registration of a user and authentication of a user device is based on a one-time seed (OTS) which is generated by an authentication server and sent to the user device. The user device employs the OTS to generate a one-time password (OTP). After registration and authentication, the OTS is deleted. As such, the OTS and OTP is used only one time. No seed is stored on the user device. As for securing the transactions, it may be signed by a one-time hash (OTH) or a one-time signing key (OTSK). Like the OTS, the OTH or OTSK is deleted from the user device after the transaction. Since the user device does not contain a seed, OTH or OTSK, there is no risk of the user device being hacked by unwanted third parties.

Systems and methods for validating an instrument

Disclosed are methods and systems for validating instruments. For instance, a request to generate a cashier's check may be received from an application executing on a drawer's computing device. Request information may be stored within a data storage entry for the check, and a code to be printed on the check may be generated to include at least a portion of the request information. Instructions may be provided to a printing system to cause the check to be printed with the code, where the printed check is invalid. Instructions may be provided to the application and/or printing system to cause display of a prompt to facilitate a reading of the code to validate the check. When information within the code is read by and received from the printing system, the check may be validated, which triggers a transfer of funds from the drawer's account. Otherwise, the check may remain invalid.

VIRTUALIZATION AND SECURE PROCESSING OF DATA
20230196356 · 2023-06-22 ·

Systems, methods, and non-transient machine-interpretable data representing executable instruction sets and/or other products for the processing of data for the 5 secure creation, administration, manipulation, processing, and storage of electronic data useful in the processing of payment transactions and other secure data processes. In various aspects and embodiments the disclosure provides secure means for the authorization of sensitive and other data processes subject to controlled access. Such processes include, for example the creation, administration, 10 authorization, virtualization, storage, and other manipulation or processing of electronic data representing characteristics of, instructions for, and information associated with consumer, business, and other payment accounts, and other forms of secure payment elements, such as payment tokens; and data useful in processing transactions using such accounts and elements. Information associated with 15 particular payment means, such as accounts or payment tokens, can be stored, for example, in a data set, usually secure, sometimes referred to as a virtual or electronic wallet, or a secure payment token.