Patent classifications
G06Q20/38215
SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS
Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.
MANAGING TRANSACTIONS IN MULTIPLE BLOCKCHAIN NETWORKS
Disclosed are computer-implemented methods, non-transitory computer-readable media, and systems for managing transactions in multiple blockchain networks. One computer-implemented method includes identifying a first transaction in a first blockchain network that is a first Hash Time Locked Contract (HTLC) transaction in the first blockchain network, identifying a second transaction in a second blockchain network that is a second HTLC transaction in the second blockchain network different from the first blockchain network, determining that a first transaction commit time of the first HTLC transaction is earlier than a second transaction commit time of the second HTLC transaction and a first secret hash of the first HTLC transaction has a same value as a second secret hash of the second HTLC transaction, and in response, determining that the first HTLC transaction and the second HTLC transaction are associated with each other and related to a cross-chain transaction.
Frictionless microlocation detection and authorization
A method and system for improving a frictionless authorization process is provided. The method includes first detecting a mobile device of a first user at first micro locations within a retail entity. Additionally, the mobile device is additionally detected entering a first check out lane of the retail entity for purchase of first items from the retail entity. The user is authorized for purchase of the first items from the retail entity and attributes associated with the previous detections with respect to the authorization are analyzed. Resulting future authorization attributes for authorizing the mobile device for future purchases of items from the retail entity are determined.
LINKING IDENTITIES IN A DISTRIBUTED DATABASE
For a user of a distributed database (100) which has a first identity, transaction data (120) of a transaction is stored in the distributed database (100). The transaction links the first identity to a second identity.
CUSTOMER IDENTIFICATION VERIFICATION PROCESS
An example device may include one or more processors to receive a request for a service from a requestor user device; provide transaction information associated with the service to a provider user device, where the transaction information may include location information corresponding to a location at which the service may be provided; obtain verification information from the requestor user device based on an interaction associated with the requestor user device or the provider user device at the location, where the verification information may include one or more characteristics of the requestor user device; generate a verification token based on the one or more characteristics of the requestor user device; and provide the verification information to the provider user device to permit the provider user device to verify the requestor user device, based on receiving the verification information and obtaining the verification token from the requestor user device.
SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS USING RISK FACTORS
Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key. Example embodiments of systems and methods can be used to provide further authentication and added levels of security for transactions.
EVM-BASED TRANSACTION PROCESSING METHOD, DEVICE AND MEDIUM
Provided are an Ethereum Virtual Machine-based transaction processing method and apparatus, a device and a medium, which relate to the field of computer technologies and, in particular, to blockchain technologies and are applicable to the field of cloud computing. An implementation scheme includes: acquiring, by a virtual machine instance running in a blockchain node, a to-be-processed transaction request; in a process of executing the to-be-processed transaction request, generating, by the virtual machine instance, a data access request for target access data and transmitting the data access request to an interface module, where the data access request includes a data read request and/or a data write request; and calling, by the interface module, a blockchain access interface for a data storage space of a blockchain according to the data access request to access the target access data and feeding back an access result to the virtual machine instance.
SYSTEMS AND METHODS FOR PERFORMING PAYMENT TRANSACTIONS USING INDICIA-BASED ASSOCIATIONS BETWEEN USER INTERFACES
Systems and methods are disclosed for performing payment transactions using indicia-based associations between two or more user interfaces. One method includes: receiving transaction information related to a user's selection of goods or services from a merchant; generating an indicia encoding the transaction information related to the selected goods or services, the merchant, and the transaction amount; transmitting the indicia to be displayed, and to enable a user interface of a first user device to scan the indicia and extract the transaction information; receiving from the first user device, an authorization to process the payment transaction using a mobile payment source; and if sufficient resources exist in the mobile payment source: generating and transmitting a low value token to the merchant indicating the authorization of the payment transaction, wherein the low value token conceals the information related to the mobile payment source; and processing the transaction using the mobile payment source.
METHOD, APPARATUS, AND COMPUTER-READABLE MEDIUM FOR CONFEDERATED RIGHTS AND HIERARCHICAL KEY MANAGEMENT
A method and apparatus for secured, peer-to-peer transfer of data rights over a computer network, the method being accomplished by a distributed computing system including a distributed ledger platform. Root rights are defined and delegated to wallets in a multilevel manner to thereby isolate wallets associated with the root right from cyber risk.
AUTHENTICATION AND PERSONAL DATA SHARING FOR PARTNER SERVICES USING OUT-OF-BAND OPTICAL MARK RECOGNITION
Disclosed are methods and apparatuses for creating a verified mutually authenticated transaction between a service provider and an on-line identity for a physical client person. A dynamic optical mark may be displayed on a device screen where the physical client person is using a web service. The dynamic optical mark may be recognized via scanning the dynamic optical mark by a personal mobile device equipped with a camera. The verified mutually authenticated transaction between the service provider and the on-line identity for the physical client person may be used for sharing personal data of the physical client person by using out-of-band optical mark recognition of the dynamic optical mark. The verified mutually authenticated transaction may be initiated with a time-limited one-time password comprising a sequence of numbers encoded in the dynamic optical mark.