G06Q20/38215

TRANSACTION AUTHENTICATION SYSTEM AND RELATED METHODS

Methods and systems are provided authenticating transactions on a token contract. A transaction rule compliance engine that utilizes stored user information to ensure that transactions of tokens associated with the token contract comply with defined ruleset. A curation system maintains the stored user information on the token contract or elsewhere on the blockchain system.

BLOCKCHAIN SYSTEM, AND DATA TRANSACTION SYSTEM IN WHICH BLOCKCHAIN SYSTEM IS USED
20210357928 · 2021-11-18 ·

To execute process for determining and confirming the validity of edit data in each block of a blockchain easily and with high security, and also to execute authority verification with which it is possible to verify the authority of editing edit data and confirm the content of editing. A blockchain system comprising a plurality of computer systems, data processing applications, and a blockchain generation part for generating a blockchain in common, each block or data having open and close secret code set therefor, and each of the data processing applications being provided with an open function for opening data in a block in response to the input of an open secret code, a data editing function for editing data, and a close function for terminating and closing edited data in response to input of close secret code. The edit data and the hash value data in a block are exchanged between blockchains. Blockchain is generated in advance by the blockchain generation part.

CONFIDENTIAL BLOCKCHAIN TRANSACTIONS
20210359864 · 2021-11-18 · ·

A computer-implemented method includes: determining assets held by a remitter, the assets to be spent in a remittance transaction between the remitter and one or more payees, in which each asset corresponds to a respective asset identifier, a respective asset amount, and a respective asset commitment value; determining a remitter pseudo public key and a remitter pseudo private key; determining a cover party pseudo public key, in which the cover party pseudo public key is obtained based on asset commitment values of assets held by the cover party; and generating a linkable ring signature for the remittance transaction.

AUGMENTED REALITY CARD ACTIVATION EXPERIENCE
20210357912 · 2021-11-18 · ·

Various embodiments are generally directed to enhancing a card activation experience for an authorized card user when activating a new card by at least displaying various types of information related to the new card in augmented reality (AR) and allowing the user to perform the activation itself or experience other aspects of the activation process in AR. Information pertaining the successful activation of the card may also be provided to the user in AR.

GUARANTEED ENCRYPTOR AUTHENTICITY

Embodiments described herein provide cryptographic techniques to enable a recipient of a signed message containing encrypted data to verify that the signer of the message and the encryptor of the encrypted data are the same party, or at the least, have joint possession of a common set of secret cryptographic material. These techniques can be used to harden an online payment system against interception and resigning of encrypted payment information.

DIGITAL CONTENT SUBSCRIPTION MANAGEMENT VIA OPTICAL CODES
20210357934 · 2021-11-18 ·

Techniques are described herein for managing digital content subscription. The techniques include transmitting a request to access premium content from a playback device logged into a user account for a streaming service. The user device receives an optical code generated by the playback device. The user device is associated with a subscriber account for telecommunication services, which include the streaming service. The techniques also include deciphering the optical code to access a payment portal and logging into the payment portal using credentials associated with the subscriber account, wherein the subscriber account is associated with the user account. Payment is submitted for the premium content using billing information associated with the subscriber account via the payment portal and the premium content may be accessed via the user account.

SYSTEMS AND METHODS FOR INTEGRATED PAYMENT TERMINAL PAYMENTS
20210357935 · 2021-11-18 ·

A method for integrated payment terminal payments may include: (1) receiving, at a first payment terminal, encrypted card information for a transaction from a second payment terminal, the first payment terminal and the second payment terminal in communication with each other; and (2) communicating, to a payment processor, the encrypted card information, transaction information, and a unique identifier for the second payment terminal to a payment processor, wherein the unique identifier for the second payment terminal is different from a unique identifier for the first payment terminal.

CONTACTLESS CARD PERSONAL IDENTIFICATION SYSTEM

A dual-factor PIN based authentication system and method uses a cryptogram provided by a contactless card associated with the client in association with a PIN stored by the contactless card to authenticate the client. In some embodiments, cryptogram authentication may be preconditioned upon a PIN match determination by the contactless card. In other embodiments, the cryptogram may be formed at least in part using the personal identification number (PIN) stored on the contactless card encoded using a dynamic key stored by the contactless card and uniquely associated with the client. Authentication may be achieved by comparing the cryptogram formed using the PIN against an expected cryptogram generated an expected PIN and an expected dynamic key.

POST-TRANSACTION TIPPING WITH MODIFIED TRANSACTION MESSAGE FIELDS

A transaction server receives a request from a POS device of a merchant. The server determines whether a merchant ID in the request matches with one stored in a database. If yes, the server automatically amends a first field with a predetermined secondary value associated with the merchant ID and updating a total in a second field as a sum of the value of the transaction and the predetermined secondary value. The server processes the request as a single request with the total in the second field. In one embodiment, if no, the server monitors subsequent streams of requests having the encrypted account and the merchant ID. Once identified, the server amends the first field with the subsequent value and updating the total in the message field as a sum of the value of the transaction and the subsequent value and processes the electronic transaction request as the single request.

CONTROL METHOD, SERVER, AND RECORDING MEDIUM

A control method is executed by one server out of a plurality of servers, each managing one of a plurality of distributed ledgers. The control method includes receiving first transaction data from a measured-value server over a network, the measured-value server providing, for each of one or more parameters for determining a price for a variable-price service, a measured value that corresponds to the parameter, and the first transaction data including the one or more parameters, the measured value, and a location and a time where and when the measured value is obtained; and transferring the received first transaction data to other servers different from the one server out of the plurality of servers and storing a first block including the first transaction data into a first distributed ledger managed by the one server.