Patent classifications
G06Q20/38215
DATA STRUCTURE FOR EFFICIENTLY VERIFYING DATA
A data structure embodied in one or more blockchain transactions has a plurality of nodes, each node embodied as a hash value contained in a blockchain transaction of the one or more blockchain transactions; and a plurality of directional edges plurality of nodes comprises leaf nodes and non-leaf nodes. In a first aspect, at least one of the non-leaf nodes has at least one child leaf node and at least one child non-leaf node, the hash value of the at least one non-leaf node being a hash of a concatenation of the respective hash values of the child leaf node and the child non-leaf node. In a second aspect, a first of the non-leaf nodes has a different number of child nodes than a second of the non-leaf nodes. In a third aspect, a first of the leaf nodes has a different level than a second of the leaf nodes.
Systems and methods for provisioning funding card numbers to third party wallets
Systems, methods, and devices for provisioning funding card numbers to merchant wallets are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for provisioning funding card numbers to third party wallets may include: (1) authenticating a customer using an electronic device; (2) redirecting the customer to a third-party website; (3) receiving, from the third-party website and via a first API, a request for funding primary account numbers (FPANs) associated with the customer; (4) providing the third-party website with a plurality of FPAN identifiers for FPANs associated with the customer; (5) receiving, from the third-party website and via a second API, a request for a FPAN associated with a selected FPAN identifier; (6) encrypting the FPAN associated with the selected FPAN identifier; and (7) communicating the encrypted FPAN to the third-party website.
OFFICE OF FOREIGN ASSETS CONTROL (OFAC) COMPLIANCE SYSTEM
A computerized method produces an identity code to identify each subject stored in the computer systems connected to a computer network while protecting the privacy and confidentiality of the subject. A central computer system receives an identity code of a suspect of a financial crime and sends the identity code to all computer systems connected to the computer network. The computer systems that have the matched identity code send the requested information to the central computer system. As a result, law enforcement organizations can eliminate crimes and financial institutions can recover the money stolen from them. In addition, law enforcement organizations and financial institutions can identify money launderers that are missed by their anti-money laundering transactional monitoring systems.
PEER-TO-PEER TERMINAL AND CONTRACT TRANSACTION SYSTEM
A peer-to-peer terminal includes a bid data obtaining unit, a bid data transmitter, a contract result calculator, a contract result transmitter, a contract result receiver, and a contract result selector. The bid data obtaining unit obtains bid data. The bid data transmitter transmits the bid data to another peer-to-peer terminal. The contract result calculator calculates a contract result from a bid data set obtained by the bid data obtaining unit and including the bid data. The contract result transmitter transmits the contract result to the other peer-to-peer terminal. The contract result receiver receives, from the other peer-to-peer terminal, another contract result calculated by the other peer-to-peer terminal. The contract result selector selects one contract result from among the contract result and the other contract result.
SECURE SHARING OF CREDENTIAL INFORMATION
A first user device may be used to request provisioning of a secure credential on a second user device. A provisioning system may facilitate the provisioning in a manner that ensures security and privacy of the requesting parties. The provisioning requests may be made using an application on the first user device such as a third-party application or using a web application via a browser. The credential may be added to a digital wallet on the second user device. The credential may be useable by the second user device to perform one or more contactless transactions.
PROXIMAL PEER TO PEER MONEY TRANSFER
The invention teaches an innovative way for users to transfer funds or crypto currency using proximal peer to peer funds transfer methodology wherein one user with a dynamic IOT smart device enabled with a proximal peer to peer funds transfer software can to transfer funds based on proximity to another user with a dynamic IOT smart device enabled with a proximal peer to peer funds transfer software. These funds transferred from one dynamic IOT smart device enabled with a proximal peer to peer funds transfer software to another may be encrypted and processed through the internet/payment gateway or may be encrypted within the proximal peer to peer funds transfer software to be processed at a later time when an alternate connection to the internet/payment gateway may be established.
Identity protection system
A central computer system transforms identification information of a consumer into an identity code that hides the identification information and stores it with contact information of a consumer's computer system. When a computer system on the network of the central computer system conducts a transaction with a subject who uses the identity code of the consumer, the central computer system contacts the consumer's computer system so that the consumer can stop the transaction if it is not authorized. Because only the identity code is used to protect the consumer, the original identification information of the consumer is fully protected.
SYSTEMS AND METHODS FOR EXECUTING ELECTRONIC TRANSACTIONS AND TOKENIZATIONS WITH DISTRIBUTED SETTLEMENT PLATFORM
Systems and methods for executing a distributed electronic transaction by a processing system are disclosed. One method includes receiving, by the processing system, a first transaction request from a first merchant system. The first transaction request may include a first exchange request and/or a distributed settlement agreement. The processing system may generate one or more tokens based on the first exchange request. The processing system may store a transaction amount based on the first exchange request in an exchange database. The processing system may transmit the one or more tokens to the first merchant system. The processing system may transmit one or more tokens based on the payment request to one or more second merchant systems.
Systems and methods for device and user authorization
Systems and methods are described for authorizing users and/or devices. An example method may comprise receiving, from a user device, a request to access a function associated with a service account. The request may comprise an identifier of the user device. The example method may comprise determining, based on the identifier, a primary authority holder of the service account. The example method may comprise determining that a first record on a first distributed ledger associated with the primary authority holder indicates that the user device is associated with the primary authority holder. The example method may comprise determining that a second record on a second distributed ledger associated with the user device indicates that the user device is associated with the primary authority holder. The example method may comprise granting, based on the request, the first record, and the second record, the user device access to the function.
Body area network facilitated authentication or payment authorization
Disclosed are examples of a method, a wearable device and a system enabling authentication of a user of a payment account or completion of a purchase transaction via signals generated by the wearable device. A process may include a wearable device generating a modulated signal using an encryption algorithm. The modulated signal may contain authentication information related to the wearable device including a cryptographic authentication message. The modulated signal is output to a biological medium interface of the wearable device that is coupled to a biological medium of a wearer of the wearable device. The biological medium is operable to conduct the modulated signal. A receiving device processes including decrypting and demodulating the modulated signal received from the biological medium. Using the demodulated signal, the authentication information transmitted from the wearable device is obtained. Based on the obtained authentication information, a transaction may be authorized, or a user authenticated.