G06Q20/38215

SYSTEM, METHOD AND DEVICE FOR PROCESSING A TRANSACTION
20220058610 · 2022-02-24 ·

A method for use in a computing device, comprising: receiving, from a remote device, a request to record an asset transfer in a first blockchain system; authenticating the request by using an authentication mechanism that is independent of the first blockchain system and obtaining an authentication record indicating that the request has been authenticated successfully; and recording the asset transfer in the first blockchain system, the asset transfer being recorded by storing the authentication record and a record of the asset transfer in a first ledger of the first blockchain system, wherein recording the asset transfer includes associating an instance of the record of the asset transfer that is stored in the first ledger of the first blockchain system with an instance of the authentication record that is stored in the first ledger of the first blockchain system.

USER ACTIVITY DETECTION FOR LOCKING CRYPTOCURRENCY CONVERSIONS

Methods and systems described herein may implement blockchain cryptocurrency transactions in a variety of environments. An online transaction processor may provide operations for user activity detection for locking cryptocurrency conversions. The transaction processor may detect used activities for a user online or at a physical location and determine that those activities indicate that the user will engage in electronic transaction processing at an upcoming time. The transaction processor may determine that the user has available cryptocurrency and may want to convert at least a portion of the cryptocurrency to another currency for the electronic transaction processing. Using a cryptocurrency exchange, the transaction processor may determine a price to convert the cryptocurrency to the other currency and may lock that price for a time period for the user. A notification may be transmitted to the user with a user interface element to accept this offer.

METHOD AND DEVICE FOR IDENTIFYING USER IDENTITY
20170302451 · 2017-10-19 ·

A method and an apparatus for identifying a user identity are disclosed. The method includes receiving, by a first platform, a first request sent by a second platform, the first request including a first identifier, the first identifier being a sequence number used for identifying the second platform and allocated to the second platform by the first platform after the second platform accesses the first platform; obtaining a second identifier corresponding to the first identifier, the second identifier being a sequence number used for identifying an identity of the second platform in the first platform; obtaining a third identifier corresponding to the first request, the third identifier being an account of a login user currently logging on to the first platform; encrypting the third identifier using the second identifier to obtain a fourth identifier; and returning the fourth identifier to the second platform. The present disclosure can enhance the security of user information, and reduce the risk of the user information being stolen due to data collection.

SYSTEMS AND METHODS FOR AUTHENTICATED PEER-TO-PEER DATA TRANSFER USING RESOURCE LOCATORS
20220368692 · 2022-11-17 ·

An authenticated data transfer system may include generating, after entry of one or more processors of a transmitting device into a communication field, a link, the link comprising a near field communication data exchange format uniform resource locator including identifier data and user data; transmitting, to a first application comprising instructions for execution on a first device, the link to initiate data transfer; authenticating a user associated with the first device by activating one or more actions based on the link; transmitting one or more requests for confirmation of quantity and recipient data associated with the data transfer; receiving one or more notifications that are based on the one or more requests for confirmation of quantity and recipient data associated with the data transfer; and performing one or more login credentials that are responsive to the one or more notifications so as to complete the data transfer.

ELECTRONIC DEVICE AND PAYMENT METHOD USING THE SAME

Disclosed is a method for split payment for an online or offline purchase of a service or goods using an electronic device, including receiving a first request in relation to a payment, generating first payment information using a transaction identification corresponding to the payment based on at least the first request, sending the first payment information to an external device, receiving a second request in relation to the payment, generating second payment information using the transaction identification based on at least the second request, and finalizing the payment based on at least the second payment information.

System and methods for validating and performing operations on homomorphically encrypted data
11257076 · 2022-02-22 · ·

Systems, methods and devices for validating and performing operations on homomorphically encrypted data are described herein. The methods include securely transmitting and extracting information from encrypted data without fully decrypting the data. A data request may include an encrypted portion including a set of confidential data. One or more sets of encrypted comparison data may be then retrieved from a database in response to the data request. The encrypted set of confidential data from the data request is then compared with each set of encrypted comparison data using one or more homomorphic operations to determine which set of encrypted comparison data matches the encrypted set of confidential data. If there is a match, this validates the set of confidential data. An encrypted indicator is then generated indicating success or failure in validating the set of confidential data, which may then be forwarded to a party associated with the data request.

System and method for processing an online transaction request

A method of processing an online transaction request involves a network gateway generating a revised transaction request from an incoming transaction request that is received from a client terminal. The revised transaction request includes a revised transaction message that is derived from the incoming transaction request and a revised transaction request cryptogram that is generated from the revised transaction message. The revised transaction request cryptogram is uniquely associated with an identity token that is interfaced with the client terminal. The network gateway receives a transaction authorization from an issuer server for the revised transaction request, and provides a revised transaction authorization message to the client terminal in accordance with the received transaction authorization. The revised transaction authorization message provides an indication of authorization of the revised transaction request.

SYSTEM AND METHODS FOR VALIDATING AND PERFORMING OPERATIONS ON HOMOMORPHICALLY ENCRYPTED DATA

A system and method of validating and performing operations on homomorphically encrypted data are described herein. The methods include processing a secure financial transaction by receiving a transaction request to complete a financial transaction, with at least a portion of the request encrypted according to a homomorphic encryption scheme, and the transaction request comprising confidential cardholder data including an account number, non-confidential cardholder data, and transaction data, and retrieving one or more sets of encrypted comparison cardholder data encrypted according to a homomorphic encryption scheme. The confidential cardholder data is then compared to each set of the comparison cardholder data using one or more homomorphic operations to determine which set of comparison cardholder data matches the confidential cardholder data and validating the confidential cardholder data. An encrypted indicator is generated indicating authorization or rejection of the request and forwarded to a party seeking authorization to complete the financial transaction.

User interfaces for managing an account

In some embodiments, exemplary user interfaces for provisioning an electronic device with an account are described. In some embodiments, exemplary user interfaces for providing usage information of an account are described. In some embodiments, exemplary user interfaces for providing visual feedback on a representation of an account are described. In some embodiments, exemplary user interfaces for managing the tracking of a category are described. In some embodiments, exemplary user interfaces for managing a transfer of items are described. In some embodiments, exemplary user interfaces for managing an authentication credential connected with an account are described. In some embodiments, exemplary user interfaces for activating a physical account object are described. In some embodiments, exemplary user interfaces for managing balance transfers are described.

Secure configuration of a secondary platform bundle within a primary platform
11671265 · 2023-06-06 ·

A primary platform (PP) can (i) support a first set of cryptographic parameters and (ii) securely download an unconfigured secondary platform bundle (SPB) that includes a configuration package (SPB CP). The SPB CP can establish a secure session with a configuration server (CS). The CS can select operating cryptographic parameters supported by the first set. The SPB CP can derive an SPB private and public key. The PP can use the selected operating cryptographic parameters to securely authenticate and sign the SPB public key. The CS can (i) verify the PP signature for the SPB public key and (ii) generate an SPB identity and certificate for the SPB and (iii) send the certificate and SPB configuration data to the SPB CP. The SPB CP can complete configuration of the SPB using the SPB identity, certificate, and configuration data. The configured SPB can authenticate with a network using the certificate.