Patent classifications
G06Q20/38215
Leveraging blockchain based machine learning modeling for expense categorization
Systems and methods disclosed herein provide automatic expense categorization of transactions or expenditures based on a machine learning (ML) model trained using anonymized transactional data for expenditures that are stored in a public blockchain. The anonymized transactional data for the expenditure and the expense category, may be distributed throughout the blockchain network and recorded in the blockchain. In some implementations, an expenditure may be submitted to the blockchain network for expense categorization. The transactional data for the expenditure may be anonymized to remove confidential and personal identifying information (PII) before it is distributed throughout the blockchain network. Each participating node of the blockchain network may utilize the ML model to identify an expense category for the expenditure. The participating nodes may provide a consensus mechanism in order to arrive at a shared understanding of how to categorize the expenditure.
ACCESS CONTROL AND MOBILE SECURITY APP
An illustrative apparatus includes a memory, a processor coupled to the memory, and a first set of instructions stored on the memory that can be executed by the processor. The processor is configured to determine authentication data, where the authentication data comprises an indication that a first functionality of a second set of instructions can be controlled and where the second set of instructions is separate from the first set of instructions. The processor is further configured to send to a user interface, an indication of the first functionality. The processor is further configured to receive, through the user interface, a request to control the first functionality of a second set of instructions that is separate from the first set of instructions. The processor is further configured to send an order to control the first functionality of the second set of instructions.
METHOD AND SYSTEM FOR ENABLING TRACEABLE PRIVACY-MAINTAINING MULTI-HOP OFFLINE TRANSACTIONS IN DIGITAL CURRENCIES
A method for processing offline cryptocurrency transfers includes: receiving, by a receiver of a computing device, a first transfer message, wherein the first transfer message is cryptographically signed using a first private key of a first key pair; validating, by a processor of the computing device, the cryptographic signature of the first transfer message using a first public key of the first key pair; storing, in a memory of the computing device, the validated first transfer message; receiving, by an input device of the computing device, a transfer instruction, the transfer instruction including at least a communication address; and electronically transmitting, by a transmitter of the computing device, the validated first transfer message to an external device based on at least the communication address.
SYSTEMS AND METHODS FOR CRYPTOCURRENCY CHECKOUT
Systems and methods for systems and methods for cryptocurrency checkout are disclosed. According to one embodiment, a method may include a financial institution backend: receiving, from a merchant backend, control of a checkout flow for a transaction comprising an identification of a good or service to purchase, wherein the merchant backend accepts payment in cryptocurrency; receiving login credentials for the customer from the computer program; retrieving a plurality of customer accounts for the customer; receiving selection of one or more of the plurality of customer accounts to fund the cryptocurrency for the transaction; deducting a payment amount for the transaction from the one or more selected customer accounts; confirming payment to the merchant backend; returning control of the checkout flow to the merchant backend, wherein the merchant backend completes the transaction with the customer; and settling the transaction by providing a settlement amount in cryptocurrency to the merchant backend.
Solid State Drives with Autonomous Control of Proof of Space Activities
An apparatus with a solid state drive (SSD) having an internal host to control proof of space activities. The SSD has a host interface configured to receive at least read commands and write commands from an external host system. The SSD has memory cells formed on at least one integrated circuit die, and a processing device configured to control executions of the read commands to retrieve data from the memory cells and executions the write commands to store data into the memory cells. The internal host operable is to generate, independent of the external host system, commands related to proof of space, such as plot generation, and plot farming.
APPARATUS AND METHODS FOR NON-FUNGIBLE TOKENS AS UNIVERSAL DIGITAL IDENTIFICATION
Apparatus and methods for utilizing non-fungible tokens (“NFTs”) as universal digital identification are provided. A user may be assigned an NFT on a distributed ledger attesting to the user's identity. The user may request to be authenticated. The user may be prompted to transfer the NFT to a smart contract on the distributed ledger. An authentication program may check the NFT and the NFT's history on the ledger to determine that the NFT belongs to the user. When the NFT belongs to the user, the authentication program may authenticate the user. The smart contract may transfer the NFT back to the user, so that the user may use the NFT again to be authenticated.
AUTOMATIC ACCESS/RESTRICTION OF NFTS
Novel technical ways of facilitating secured execution of blockchain transactions are presented. In various embodiments, a system, comprises a non-transitory memory comprising instructions; and one or more hardware processors coupled to the non-transitory memory and configured to read the instructions to cause the system to perform operations comprising: detecting a request from a first user to access one or more digital assets of a first digital wallet of a second user; in response to detecting the request, determining whether to provide access to the one or more digital assets to the first user based on one or more factors, wherein the one or more factors includes a location of the first user, a location of the second user, or one or more characteristics of the first user; and restricting the first user from accessing the one or more digital assets based on the one or more factors.
Multi-network tokenization processing
Systems, apparatuses, and methods are provided for enabling a transaction using a token associated with a first payment network to be conducted using a second payment network. When a transaction using a token is submitted to a payment network, the payment network can determine the payment network associated with the token. If the token is associated with a second payment network, a token verification request including the token can be sent to the second payment network. The second payment network can then return a token verification response including a primary account identifier such as a primary account number (PAN) corresponding to the token and a validation result. The transaction may then be processed using the primary account identifier.
Method and apparatus for authenticating and processing secure transactions using a mobile device
A method and apparatus for processing secure transactions of a requested service at a merchant point of sale (POS) using a customer mobile device and a virtual payment gateway (VPG) server, the method comprising an authentication and a transaction. The activation establishes a mobile device transport key (mTK) at the mobile device and a server, and assigns a mobile application identifier (MAID) to a mobile application of the mobile device. The transaction is based on generating a mobile device transport session key (msTK) derived from a server generated session ID and the mobile device transport key (mTK) generated during activation. The transaction of the requested service is initiated by the customer mobile device and is processed without storing confidential data such as financial account data or financial account identification data at the POS and/or the customer mobile.
Browser extension for limited-use secure token payment
Methods and systems for a browser extension system are disclosed. In some embodiments, a browser extension server includes a communication device configured to communicate with a first computing device executing a browser extension application and a web browser application and a second computing device executing an authentication application. The browser extension server further includes a memory storing instructions, and a processor configured to execute the instructions to perform operations. The operations may include receiving from the first computing device an indication of a financial service account associated with the first computing device, detecting a payment field in a web page provided by the computing device through the web browser application and, in response, generating a secure token mapped to the financial service account. The operations may further include sending the second computing device an authentication request, receiving an authentication response, and populating the payment field with the secure token.