Patent classifications
G06Q20/38215
Tokenizing sensitive data
Included are embodiments for tokenizing sensitive data. Some embodiments of systems and/or methods are configured to receive sensitive data from a vendor, determine a token key for the vendor, and utilize a proprietary algorithm, based on the token key to generate a vendor-specific token that is associated with the sensitive data. Some embodiments include creating a token identifier that comprises data related to the token key sending the vendor-specific token and the token identifier to the vendor.
CREATING AND MANAGING ARTIFICIALLY INTELLIGENT ENTITIES REPRESENTED BY NON-FUNGIBLE TOKENS ON A BLOCKCHAIN
Some examples of the present disclosure relate to generating artificially intelligent entities represented on a blockchain using a non-fungible token (NFT). In one such example, a system can generate an NFT on a blockchain. The NFT can represent an artificially intelligent entity. The system can also generate a personality dataset on the blockchain, the personality dataset describing personality characteristics of the artificially intelligent entity. The system can then correlate the NFT to the personality dataset, thereby assigning the personality characteristics to the artificially intelligent entity. Once generated, the artificially intelligent entity may reside in a virtual ecosystem in which it can perform tasks and learn over time.
CERTIFICATE VERIFICATION METHOD AND APPARATUS USING NON-FUNGIBLE TOKEN
Disclosed herein are a certificate verification method and apparatus using a Non-Fungible Token (NFT). The certificate verification method includes receiving a user Identification(ID) and a certificate image, extracting Optical Character Reader (OCR) data from the certificate image, generating metadata based on the OCR data, and verifying a certificate by comparing content of a token registered in a blockchain based on the user ID with the generated metadata.
SYSTEMS AND METHODS FOR PROVISIONING FUNDING CARD NUMBERS TO THIRD PARTY WALLETS
Systems, methods, and devices for provisioning funding card numbers to merchant wallets are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor, a method for provisioning funding card numbers to third party wallets may include: (1) authenticating a customer using an electronic device; (2) redirecting the customer to a third-party website; (3) receiving, from the third-party website and via a first API, a request for funding primary account numbers (FPANs) associated with the customer; (4) providing the third-party website with a plurality of FPAN identifiers for FPANs associated with the customer; (5) receiving, from the third-party website and via a second API, a request for a FPAN associated with a selected FPAN identifier; (6) encrypting the FPAN associated with the selected FPAN identifier; and (7) communicating the encrypted FPAN to the third-party website.
Fungible and Non-Fungible Tokens with Authenticity: Systems and Methods for Secure Funding and Fundraising for Businesses
An exemplary embodiment comprises fungible tokens with authenticity, namely Krypto coins (38), one non-fungible token with authenticity, namely business identification (BID) token (36), at least one crypto wallet (22) owned by a business owner of a business, and at least one business registry record (53) managed by a business registration authority. The Krypto coin (38) contains a unique identifier: the BID token's token address (36). The BID token (36) contains an identification hash, which uniquely represents the business identity, and a registrar address which points to the registration authority. The registration authority is the one who has confirmed the real-life identity of the business owner, the legally registered information of the business entity, and the legitimate ownership of the owner over the business and has created the registry record (53) on a blockchain. By looking for the existence of the business registry record (53) on the blockchain, investors can verify the authenticity of the Krypto coins before investing in the business, and the business owner can offer Krypto coins to investors for fundraising with more credibility and trust. Details of funding and fundraising processes with Krypto coins are discussed. Other embodiments are described and shown.
System and method for two-click validation
A method to enable transactions comprising transmitting, by a vendor server, a request message to the e-commerce system for a token. Receiving a token in response to the request message. Generating an offer message including a mailto hyperlink, wherein the offer message is an email message including a mailto hyperlink is configured to generate an email reply message include the token. Transmitting the offer message to an email address associated with the customer. Receiving a response message from the e-commerce system, the response message including transaction details that confirm the token was validated by the e-commerce system. Transmitting a payment processing request message to a payment processor, wherein the payment processing request is based on the transaction details. Receiving a notification from the payment processor, that payment processing has been completed. Transmitting an email message to the email address of the customer, that payment has been processed.
SYSTEM FOR FACILITATING SECURE ELECTRONIC COMMUNICATIONS BETWEEN ENTITIES AND PROCESSING RESOURCE TRANSFERS
Embodiments of the present invention provide a system for utilizing one or more decentralized applications to allow entities to interface with a blockchain for the purposes of conducting a resource transfer. Typically, the blockchain is a permissioned blockchain which may be accessed only by the entities involved in the resource transfer. The decentralized applications may communicate with the legacy systems within each entity through an application programming interface (API) such that the data stored on the legacy systems may be governed by the blockchain. This ensures the authenticity of the data stored on the legacy systems while preventing the possibility of disparate versions of data being created over time.
Systems and methods for managing digital identities
Systems and methods for managing digital identities. In some embodiments, a method is provided, comprising acts of: receiving a request to validate at least one statement about a user; identifying, from the request, a reference to a distributed ledger, the reference comprising an identifier for the distributed ledger and an identifier for a transaction recorded on the distributed ledger; identifying, based at least in part on the identifier for the distributed ledger, at least one node of a network of nodes managing the distributed ledger; and communicating with the at least one node to validate the at least one statement about the user.
Method, System, and Computer Program Product for Network Bound Proxy Re-Encryption and Pin Translation
A method, system, and computer program product generate, with a payment network, a first value (a) and a second value (g.sup.a), the second value (g.sup.a) generated based on the first value (a) and a generator value (g); generate, with the payment network, a plurality of random merchant numbers (m.sub.i) for a respective plurality of merchant banks; determine, with the payment network, a merchant product (M) based on a product of the plurality of random merchant numbers (m.sub.i); generate, with the payment network, a public key (pk.sub.i) based on the second value (g.sup.a), the merchant product (M), and the random merchant number (m.sub.i) and a random key (rk.sub.i) based on the merchant product (M) and the random merchant number (m.sub.i) for each respective merchant bank; and communicate, with the payment network, the public key (pk.sub.i) and the random key (rk.sub.i) to at least one respective merchant bank.
Systems and methods for machine forward energy and energy credit purchase
Systems and methods for machine forward energy and energy credit purchase are disclosed. An example transaction-enabling system may include a machine having an energy requirement for a task and a controller. The controller may include a resource requirement circuit to determine an amount of an energy resource for the machine to service the energy requirement, a forward resource market circuit to access a forward resource market, and a resource distribution circuit to execute a transaction of on the forward resource market in response to the determined amount of the energy resource.