G06Q20/38215

Confidential blockchain transactions
11233660 · 2022-01-25 · ·

A computer-implemented method includes: determining assets held by a remitter, the assets to be spent in a remittance transaction between the remitter and one or more payees, in which each asset corresponds to a respective asset identifier, a respective asset amount, and a respective asset commitment value; determining a remitter pseudo public key and a remitter pseudo private key; determining a cover party pseudo public key, in which the cover party pseudo public key is obtained based on asset commitment values of assets held by the cover party; and generating a linkable ring signature for the remittance transaction.

Transaction For Tamper and Quality Evidenced Delivery of Purchase Incented By Donation

Incentives are offered by merchants, delivery services, issuers, acquirers, and transaction handlers are made to an account holder to make an authorized e-commerce transaction for the delivery of a purchase in exchange for the offerors making a donation to the account holder's designed charity. To incent purchases from local merchants, the incentive may limit the donation by a derivation of navigation time between account holder and merchant. The consumer uses any one of several different merchant websites to check-out so as to purchase the selected goods and services in the account holder's virtual shopping cart that the account holder selected from any of the several different merchant websites, while avoiding interacting with third party vendors. The consumer shops with different merchants at different webpages without requiring the account holder to use a separate permission or log-in for each different merchant. The account holder receives the packaged purchase in tamper evident packaging, and has access to chain of custody documentation and blockchain data sufficient to assure a certification of quality for the purchase in the delivered package. The consumer receives the package purchase from a delivery service by a process that is socially distanced with contactless acceptance of the packaged purchase. The consumer receives a survey by which feedback communications can be provided about the delivery of the packaged purchase.

TOKENIZING SENSITIVE DATA

Included are embodiments for tokenizing sensitive data. Some embodiments of systems and/or methods are configured to receive sensitive data from a vendor, determine a token key for the vendor, and utilize a proprietary algorithm, based on the token key to generate a vendor-specific token that is associated with the sensitive data. Some embodiments include creating a token identifier that comprises data related to the token key sending the vendor-specific token and the token identifier to the vendor.

SYSTEMS AND METHODS FOR PERFORMING TRANSACTIONS WITH CONTACTLESS CARDS

Example embodiments of systems and methods for data transmission system between transmitting and receiving devices are provided. In an embodiment, each of the transmitting and receiving devices can contain a master key. The transmitting device can generate a diversified key using the master key, protect a counter value and encrypt data prior to transmitting to the receiving device, which can generate the diversified key based on the master key and can decrypt the data and validate the protected counter value using the diversified key.

Systems and methods for transaction account tokenization

A system may receive a request for a payment payload for a payment transaction with the request including a token and a transaction amount. The token may identify a transaction account for use in the payment transaction. The system may assess the risk of fraud associated with the transaction account and the payment transaction. The system may return the payment payload in response to a favorable risk assessment. The payment payload may be passed to a merchant and from the merchant to a payment network for evaluation. The payment transaction may be approved or declined based on the contents of received payment payload matching the contents of a generated payment payload.

Electronic payment method and electronic device using ID-based public key cryptography

Provided are an electronic payment method and an electronic device using identity-based public key cryptography. The electronic payment method includes receiving, from a key management service (KMS) server that stores personal information of a user, a private key of the user generated according to an Identity-based public key cryptography (IDPKC) protocol; encrypting payment information by using a public key of a payment device being generated according to the IDPKC protocol, and encrypting order information by using a public key of a seller device being generated according to the IDPKC protocol; producing, according to the IDPKC protocol, a dual signature of the encrypted payment information and the encrypted order information by using the private key; transmitting a transaction request including the dual-signed payment information and the dual-signed order information to the seller device; and receiving a response to the transaction request from the seller device.

Smart Contract-Based Electronic Contract Forensics Method and System
20220020019 · 2022-01-20 ·

This application provides a smart contract-based electronic contract forensic method: when a user wants to perform forensic on an electronic contract in a blockchain digital deposit platform, initiating, by an existing electronic contract platform, a forensic request for the electronic contract; obtaining, by the blockchain digital deposit platform, the forensic request and querying deposit information; if a deciding result is that deposit information corresponding to the electronic contract is stored in the blockchain digital deposit platform, deciding whether there is a deposit transaction in the blockchain digital deposit platform; after the deposit transaction is queried in the blockchain digital deposit platform, initiating a forensic transaction to the smart contract in the blockchain digital deposit platform; verifying the forensic transaction, and executing the smart contract, to generate a forensic token; generating an execution result based on the forensic token; obtaining a digest of the deposit transaction based on the execution result; decrypting the digest, to obtain a storage index table; downloading transaction data of the deposit transaction according to a data index; decrypting the transaction data; and verifying validity, legitimacy, and integrity of the decrypted transaction data.

Transaction mode-based electronic contract preservation system
20220020014 · 2022-01-20 ·

This application discloses a transaction-based electronic contract deposit system, including an electronic contract platform and a blockchain deposit platform, the blockchain deposit platform including a plurality of deposit nodes that provide deposit services for the electronic contract platform. In this way, the following problem may be resolved: regarding an existing manner of storing an electronic contract in a centralized way, during a subsequent process of invoking electronic contract data, the stored electronic contract data becomes untrustworthy because the contract data is at a risk of being easily tampered with and forged.

COMPUTER SYSTEM AND METHOD FOR MORE EFFICIENTLY STORING, ISSUING, AND TRANSACTING TOKENIZED BLOCKCHAIN GAME ASSETS MANAGED BY A SMART CONTRACT

A computer system and method is disclosed including a vault application to facilitate the transacting of game assets represented by tokens managed by a smart contract via a hybrid approach that permits certain transactions of game assets to be conducted using an in-game centralized database approach (which does not necessarily include a decentralized network) and other transactions to be managed on a decentralized network, via a blockchain or other distributed ledger technology (DLT) network.

Secured account provisioning and payments for NFC-enabled devices

Systems, methods, and articles of manufacture for secured account provisioning and payments using near-field communication (NFC) enabled devices are provided. The system may receive an encrypted account provisioning request comprising a provisioning account and a device fingerprint; decrypt the encrypted account provisioning request with a server root key; retrieve a limited use payment credential (LUPC) based on the provisioning account; generate an ENC key, a MAC key, and a DEK key based on the device fingerprint and the server root key; and encrypt the LUPC using the ENC key, the MAC key, and the DEK key to generate an encrypted account payload.