G06Q20/38215

PRODUCT TRANSACTION INFORMATION DISPLAY METHOD AND TRANSACTION PRIVACY PROTECTION SYSTEM BASED ON SMART ACCESSORY

A product transaction information display method and a transaction privacy protection system based on a smart accessory include connecting the smart accessory to obtain a display of transaction information and one-click sending transaction instructions to complete the transaction. The smart accessory stores a user key and personal privacy information, and the encrypted user key and personal privacy information in the smart accessory worn by the user are read to realize a decentralized electronic identity or a decentralized identity (DID) method.

METHOD AND SYSTEM FOR TRANSFER OF OWNERSHIP OF NFT (NON-FUNGIBLE TOKEN) UPON REFUND TRANSACTION IN PAYMENT NETWORK

A method for enabling refund of a non-fungible token (NFT) includes: receiving a transaction message for a payment transaction; processing the payment transaction using the transaction message, where processing includes identification of a transaction identifier for the payment transaction; transmitting the transaction identifier to a first device; receiving a notification message including the transaction identifier and a token identifier, where the token identifier is associated with the NFT; receiving a refund request message from a second device, where the refund request message includes the transaction identifier and/or the token identifier; processing a refund transaction for the payment transaction; and submitting the transaction identifier as input into a smart contract stored in a blockchain associated with the NFT for reversal of ownership of the NFT.

TRADING ANALYTICS FOR CRYPTOGRAPHIC TOKENS THAT LINK TO REAL WORLD OBJECTS

Systems and methods that generate data representing an analytic result relating to at least one of a state, a workflow, or an event in a digital token system, including a digital token system that cryptographically links a set of digital tokens to instances of a set of real-world entities. The systems and methods produce a trading analytic by processing a set of collected data, structuring and filtering the collected data to obtain a multi-dimensional structured data set, and querying the multi-dimensional structured data set. Systems and methods further leverage a set of data collection services configured to collect data from one or more interfaces, a set of workflows configured to produce event data, and a data store configured to store collected attribute data.

INITIATING A WORKFLOW IN A DIGITAL TOKEN TRANSACTION SYSTEM BASED ON A RECOGNIZED ACTIVITY IN A CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM

Systems and methods for tokenizing real-world items for use in digital commerce are disclosed. In some embodiments, a recognized activity in a workflow of a customer relationship management system triggers a workflow for a set of digital tokens associated with the recognized activity in a digital token transaction system.

IMPLEMENTING NON-FUNGIBLE TOKENS AND A DISTRIBUTED TRUST COMPUTING NETWORK FOR PURPOSES OF ASSESSING RESOURCE VOLUME OF CONTENTS STORED IN A SECURE CONTAINER
20230274260 · 2023-08-31 · ·

Intelligent assessment of the resource volume associated with physical objects stored in a secure container. Digital images of the contents/physical objects and evidentiary artifacts associated with the objects are captured and used to assess an initial resource volume. In specific embodiments, Non-Fungible Token(s) are generated using the digital image and the initial resource volume as inputs. Subsequently, nodes of a distributed trusts computing network are tasked with determining a current resource advancement volume for the NFT(s) based on the current demand, current resource advancement providers assessment and the initial resource volume. As a result of the present invention, a secure container holder or entity having an interest in the contents of the secure container is able to take otherwise idle property (i.e., the contents/objects in the secure container) and use them to create a tradeable commodity in the form of an NFT and/or leverage resource liquidity.

SYSTEMS AND METHODS FOR MINTING NON-FUNGIBLE TOKENS AT A POINT OF SALE
20230274268 · 2023-08-31 · ·

Systems and methods are disclosed that generate Non-Fungible Tokens (NFTs) at a point of sale using a QR code and a private key. The systems and methods can also be used to verify the purchase of a ticket to a real-world event such as a concert for display, purchase, or sale in the so-called Metaverse. The systems and methods can be used to verify the source of a credential such as a diploma, degree, or certification of any kind. The systems and methods mint NFTs that can be used to prove the source or authenticity of the real-world product, event, or credential. The requestor of the verification can be a 3.sup.rd party such as a social media, ecommerce, or dating platform.

System and method for information protection

A computer-implemented information protection method comprises: obtaining a plurality of encrypted transaction amounts associated with transactions among a plurality of accounts, wherein each of the encrypted transaction amounts is associated with one of the accounts that sends or receives one of the transaction amounts, and the encryption of each of the transaction amounts at least conceals whether the one account sends or receives the one of the transaction amounts; generating a sum proof based on the obtained encrypted transaction amounts, the sum proof at least indicating that the transaction amounts are balanced; and transmitting the encrypted transaction amounts and the sum proof to one or more nodes on a blockchain network for the nodes to verify the transactions.

Methods and systems of providing verification of information using a centralized or distributed ledger

A method and system of providing verification of information of a user relating to an attestation transaction is provided, and includes sending a request for information of the user, wherein the information has been previously attested to in an attestation transaction stored within a centralized or distributed ledger at an attestation address; receiving at a processor associated with a verifier the information of the user; sending a cryptographic challenge nonce; receiving at the processor associated with the verifier the cryptographic challenge nonce signed by the user's private key; verifying user identity with the cryptographic challenge nonce signed by the user's private key; deriving a public attest key by using the information of the user; deriving an attestation address using the public attest key; and verifying the existence of the attestation transaction at the attestation address in the centralized or distributed ledger.

Inaudible voice payment

A method and a system are provided for secure payment card transactions using a voice enabled device. The user device encodes a tokenized payment card transaction into an inaudible soundwave and emits the soundwave via a speaker to the voice enabled device. The voice enabled device, while in a listening state, detects the inaudible soundwave via a microphone. The voice enabled device decrypts the inaudible soundwave and transmits the decrypted tokenized payment for downstream processing by the payment card system.

Proof of work based on compressed video

An approach is provided that transmits a compressed video file and a work unit to various clients, receiving, from at least one of the clients. A proof of work submission is received from one of the clients with the proof of work being a result of one or more computations performed by the client on a rendered form of the compressed video file. The approach determines whether the proof of work submission is acceptable. If the proof of work submission is acceptable, then a block is added to a set of blocks included in a blockchain.