Patent classifications
G06Q20/38215
COMPUTER-IMPLEMENTED METHODS AND SYSTEMS FOR AUTHENTIC USER-MERCHANT ASSOCIATION AND SERVICES
A system for identifying genuine user-merchant association. The system includes one or more processors and/or transceivers individually or collectively programmed to check the validity or expiration of a certificate from a device from which a request originates to create a certificate score, analyze previous communication from the device from which the request originates across a plurality of entities and regions to create a previous communication score, and conduct a messaging protocol check to create a protocol score. The one or more processors and/or transceivers are also programmed to output a weighted final score comprising a determination of whether to accept or deny the request based at least in part on one or more of the certificate scores, the previous communication score, or the protocol score. The one or more processors and/or transceivers are also programmed to save the weighted final score.
SYSTEMS AND METHODS FOR PERFOMING SECURE TRANSACTIONS
Described embodiments provide systems and methods for performing secure transactions. A first service executing on at least one server may receive a request from a second service for the first service to perform a transaction. The request may include an identifier of a record. An agent of the first service may determine, according to the identifier, whether the record is present in a storage. The storage may be accessible using credentials of the agent of the first service and an agent of the second service. The first service may send a response to the request if the record is present in the storage.
SECURING TRANSACTIONS WITH SINGLE-USE ACCOUNT TOKENS
Disclosed are various embodiments for securing transactions with single-use account tokens. In one embodiment, an authorization system creates a single-use account token for a valid primary account identifier. The single-use account token is sent as an email attachment to an email address of an associate account holder. A user device is configured to load the single-use account token from the email attachment into a wallet application of the user device. The valid primary account identifier is prevented from being used by the authorization system to authorize a transaction in response to the single-use account token being created.
REAL-TIME MULTIPLE-ACCESS EXCHANGE-PARTY-FREE COUNTERPARTY-SECURE EXCHANGE
A system, method, apparatus, and computer software for conducting real-time cross-network counterparty-secure exchange-party-free crypto currency payments, trade, and exchange. The system includes decentralized processing computers operating together peer-to-peer in communication with multiple crypto currency blockchain networks via an internet connection. The method includes requesting a sell or a buy of a Face Value denoted as dx; publishing the request to a market network; accessing transaction data stored in multiple blockchain networks, each of the multiple blockchain networks being different from each other; quoting a value for settlement of the request denoted as dy; verifying the value as according to a predetermined protocol; issuing transactions to effect the request; and producing a trading report. By providing a generalized cryptographic security system, a real-time multiple-access exchange-party-free counterparty-secure exchange is made possible offering a huge market extremely valuable features that are not currently available to crypto currency exchange system users.
SYSTEM FOR ENHANCED AUTHENTICATION USING VOICE MODULATION MATCHING
Systems, computer program products, and methods are described herein for enhanced authentication using voice modulation matching. The present invention is configured to capture, via a first user input device, a digital audio stream of speech data of a first user; receive one or more identification credentials associated with the first user; encode the speech data to generate encoded speech data; query one or more data repositories using the encoded speech data; in response, retrieve, encoded speech data associated with a second user that matches the encoded speech data of the first user; determine that the first user has a familial relationship with the second user; generate an authentication token for the first user based on at least determining that the first user has a familial relationship with the second user; and record the authentication token for the first user in a distributed ledger associated with the second user.
Computer implemented blockchain-based system for agricultural products
A platform built on blockchain that is designed to help increase traceability, efficiency and fairness in agricultural supply chains, such as the coffee, cocoa, tea, sugar, grains and fruit supply chains. The platform includes a Self-Sovereign Identity solution, a new form of digital identity built on distributed ledger technology. Farmers, wholesalers, traders and retailers can interact more efficiently using comprehensive, near real-time access to this data, and consumers can have new insights about the origins of the products they consume. The platform includes a consumer-facing application that pulls information directly from the blockchain and connects the final consumer, e.g. a coffee drinker, to farmers, traders, roasters and brands. The information is presented on an interactive map, allowing each product to tell a story in a simple and scalable way. The app also presents sustainability projects in coffee communities and an opportunity for consumers to directly support them.
System and method employing virtual ledger with non-fungible token (NFT) generation
A system, method and computer program product for computer based open innovation, includes an asset valuation device receiving asset information regarding tangible or non-tangible assets, and generating a valuation signal, based thereon; a self-executing code device receiving the valuation signal, and generating a self-executing code signal, based thereon; an air router device having both low band radio, and internet router channels for redundant internet communications, and a malicious code removal device for scrubbing malicious code from data received, receiving the valuation signal, and generating a node voting request signal, based thereon; a mesh network having node devices receiving the node voting request signal, and generating vote confirmation signals, based thereon; and computing devices connected to each of the respective node devices, and configured to perform non-fungible token (NFT) generation based on the assets, including tracking respective ownership and valuation of the assets, based on the asset information.
Transaction certification management system, transaction certification management apparatus, and transaction certification processing method
In general, according to one embodiment, a transaction certification system includes a transaction processing apparatus and a server. The transaction processing apparatus outputs encrypted data including transaction certification data for certification of a transaction executed on the transaction processing apparatus. The server receives the encrypted data from a first terminal apparatus that reads the encrypted data that has been output by the transaction processing apparatus. The server acquires a first user identifier identifying a user of the first terminal apparatus sending the encrypted data. The server stores the transaction certification data of the encrypted data in a storage device. The transaction certification data is stored in correlation with the acquired user identifier. The server receives a second user identifier from a user requesting a transaction certification, and then transmits the transaction certification data to a second terminal apparatus associated with the second user identifier.
Object oriented smart contracts for UTXO-based blockchains
Disclosed is method and system for turning existing object-oriented programming languages into smart contract languages without introducing new syntactic features. The invented method and system provide a protocol that enables storing a history of computations on a decentralized computer network, such as UTXO-based blockchain system, for any object-oriented computer language. The invented method and system further provide for storing and updating data on blockchains, where such blockchains may be used in cryptocurrency applications and for smart contracts.
Systems and methods for contactless card activation
A method, apparatus, and system of activating and using a contactless card are disclosed. A mobile device includes a wireless chip structured to allow short-range wireless communications (e.g., a near-field communication), a processor, and a memory storing instructions. The mobile device is configured to communicate with a contactless card via a short-range wireless communication and receive a customer-specific uniform resource locator (URL) from the contactless card via a wireless chip. In response, the mobile device is configured to automatically open a web browser and navigate to a website associated with the customer-specific URL. The customer-specific URL identifying the client associated with the contactless card. The mobile device then prompts, via a GUI on the display, a user for authentication information, and based on a verification of the authentication information, display a confirmation page indicating activation of the contactless card.